InsighthubNews
  • Home
  • World News
  • Politics
  • Celebrity
  • Environment
  • Business
  • Technology
  • Crypto
  • Sports
  • Gaming
Reading: CISA adds actively exploited XSS bug CVE-2021-26829 in OpenPLC ScadaBR to KEV
Share
Font ResizerAa
InsighthubNewsInsighthubNews
Search
  • Home
  • World News
  • Politics
  • Celebrity
  • Environment
  • Business
  • Technology
  • Crypto
  • Sports
  • Gaming
© 2024 All Rights Reserved | Powered by Insighthub News
InsighthubNews > Technology > CISA adds actively exploited XSS bug CVE-2021-26829 in OpenPLC ScadaBR to KEV
Technology

CISA adds actively exploited XSS bug CVE-2021-26829 in OpenPLC ScadaBR to KEV

November 30, 2025 5 Min Read
Share
CISA adds actively exploited XSS bug CVE-2021-26829 in OpenPLC ScadaBR to KEV
SHARE

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has updated its Known Exploited Vulnerabilities (KEV) Catalog to include security flaws affecting OpenPLC ScadaBR, citing evidence of active exploitation.

The vulnerability in question is CVE-2021-26829 (CVSS score: 5.4), a cross-site scripting (XSS) flaw that affects Windows and Linux versions of the software via system_settings.shtm. Affects the following versions:

  • OpenPLC ScadaBR on Windows ~ 1.12.4
  • OpenPLC ScadaBR on Linux ~ 0.9.1

The security flaws were added to KEV’s catalog a little more than a month after Fores Scout announced in September 2025 that it had captured a pro-Russian hacktivist group known as TwoNet targeting the company’s honeypots, mistaking them for water treatment facilities.

In the compromise targeting the decoy plant, the attackers allegedly went from initial access to destructive behavior in approximately 26 hours, using default credentials to gain initial access and then creating a new user account named “BARLATI” to perform reconnaissance and persistence activities.

The attackers then exploited CVE-2021-26829 to modify the HMI login page description, display a pop-up message that read “Hacked by Barlati,” and change system settings to disable logs and alarms without realizing they were compromising the honeypot system.

TwoNet attack chain

“The attackers focused solely on the web application layer of the HMI and did not attempt to escalate privileges or exploit the underlying host,” Forescout said.

TwoNet began operating on Telegram in early January of this year, initially focusing on distributed denial of service (DDoS) attacks, but has since pivoted to a broader range of activities, including targeting industrial systems, leaking personal information, and commercial services such as ransomware-as-a-service (RaaS), hacking-for-hire, and early access brokerage.

See also  New bug in Oracle E-Business Suite could allow hackers to access data without logging in

It also claims to be affiliated with other hacktivist brands such as CyberTroops and OverFlame. “TwoNet is now combining traditional web strategies with high-profile claims about industrial systems,” the cybersecurity firm added.

In view of active exploitation, Federal Civilian Executive Branch (FCEB) agencies must apply the necessary fixes by December 19, 2025 to achieve optimal protection.

OAST service facilitates exploit operations

The development comes after VulnCheck announced that it observed “long-running” out-of-band application security testing (OAST) endpoints on Google Cloud driving regionally focused exploit operations. Data from internet sensors deployed by the company indicates that this activity is targeting Brazil.

“We observed approximately 1,400 exploitation attempts across over 200 CVEs linked to this infrastructure,” said VulnCheck CTO Jacob Baines. “Although much of the activity resembled the standard Nuclei template, the attackers’ hosting choices, payloads, and geo-targeting were not consistent with common OAST usage.”

This activity involves exploiting a flaw and, if successful, issues an HTTP request to one of the attacker’s OAST subdomains (‘*.i-sh.detectors-testing(.)com’). OAST callbacks associated with this domain date back to at least November 2024, suggesting it has been ongoing for about a year.

The attempts were found to originate from US-based Google Cloud infrastructure and demonstrate how malicious actors are weaponizing legitimate internet services to evade detection and blend in with normal network traffic.

VulnCheck said it also identified a Java class file (“TouchFile.class”) hosted at an IP address (“34.136.22(.)26”) linked to the OAST domain. This file extends the publicly available exploit for the Fastjson remote code execution flaw to accept commands and URL parameters, execute those commands, and make an outbound HTTP request to the URL passed as input.

See also  New Assessment ClickFix Campaign Offers Amatera Stealer and NetSupport RAT

“The long-lived OAST infrastructure and consistent regional focus suggest that the attackers are conducting continuous scanning operations rather than short-lived opportunistic probing,” Baines said. “Advertisers continue to acquire off-the-shelf tools like Nuclei and deploy exploits across the internet to quickly identify and compromise vulnerable assets.”

Share This Article
Twitter Copy Link
Previous Article If The Last of Us hasn't broken your heart yet, get it for half off during the Black Friday sale If The Last of Us hasn’t broken your heart yet, get it for half off during the Black Friday sale
Next Article Attacks on ICE increase by 1,000%?Trump administration's claim not supported by court records Attacks on ICE increase by 1,000%?Trump administration’s claim not supported by court records

Latest News

Silver Fox uses fake Microsoft Teams installer to spread ValleyRAT malware in China

Silver Fox uses fake Microsoft Teams installer to spread ValleyRAT malware in China

threat actor known as silver fox In attacks targeting Chinese…

December 4, 2025
Critical RSC bug in React and Next.js allows unauthenticated remote code execution

Critical RSC bug in React and Next.js allows unauthenticated remote code execution

A maximum severity security flaw has been disclosed in React…

December 3, 2025
India orders messaging apps to work only with active SIM cards to prevent fraud and abuse

India orders messaging apps to work only with active SIM cards to prevent fraud and abuse

India's Department of Telecommunications (DoT) has directed app-based telecom service…

December 2, 2025
India orders mobile phone manufacturers to pre-install Sanchar Saathi app to prevent wire fraud

India orders mobile phone manufacturers to pre-install Sanchar Saathi app to prevent wire fraud

India's Ministry of Telecommunications has reportedly asked major mobile device…

December 1, 2025
CISA adds actively exploited XSS bug CVE-2021-26829 in OpenPLC ScadaBR to KEV

CISA adds actively exploited XSS bug CVE-2021-26829 in OpenPLC ScadaBR to KEV

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has updated…

November 30, 2025

You Might Also Like

Lighthouse Phishing Platform
Technology

Google sues China-based hackers behind $1 billion Lighthouse phishing platform

3 Min Read
Europol dismantles SIM farm network running 49 million fake accounts worldwide
Technology

Europol dismantles SIM farm network running 49 million fake accounts worldwide

4 Min Read
Hackers are actively exploiting the 7-Zip symbolic link-based RCE vulnerability (CVE-2025-11001)
Technology

Hackers are actively exploiting the 7-Zip symbolic link-based RCE vulnerability (CVE-2025-11001)

2 Min Read
North Korean hacker combines BeaverTail and OtterCookie to create advanced JS malware
Technology

North Korean hacker combines BeaverTail and OtterCookie to create advanced JS malware

6 Min Read
InsighthubNews
InsighthubNews

Welcome to InsighthubNews, your reliable source for the latest updates and in-depth insights from around the globe. We are dedicated to bringing you up-to-the-minute news and analysis on the most pressing issues and developments shaping the world today.

  • Home
  • Celebrity
  • Environment
  • Business
  • Crypto
  • Home
  • World News
  • Politics
  • Celebrity
  • Environment
  • Business
  • Technology
  • Crypto
  • Sports
  • Gaming
  • World News
  • Politics
  • Technology
  • Sports
  • Gaming
  • About us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms of Service
  • About us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms of Service

© 2024 All Rights Reserved | Powered by Insighthub News

Welcome Back!

Sign in to your account

Lost your password?